Subcategories
Tags
Language
Tags

Security and Privacy: Select Proceedings of ICSP 2020

Posted By: AvaxGenius
Security and Privacy: Select Proceedings of ICSP 2020

Security and Privacy: Select Proceedings of ICSP 2020 by Pantelimon Stănică
English | EPUB | 2020 | 183 Pages | ISBN : 9813367806 | 20.1 MB

This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy.

Unconventional IT & Network Security - Innovative Approaches

Posted By: ELK1nG
Unconventional IT & Network Security - Innovative Approaches

Unconventional IT & Network Security - Innovative Approaches
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 7 lectures (39m) | Size: 187.9 MB

Be As Secure as you can be

Network Security Auditing with nmap

Posted By: ELK1nG
Network Security Auditing with nmap

Network Security Auditing with nmap
MP4 | Video: h264, 1280x720 | Audio: AAC, 44100 Hz
Language: English | Size: 3.26 GB | Duration: 7h 43m

Learn to perform network security scanning with nmap in the right way.

Microsoft Azure Network Security

Posted By: hill0
Microsoft Azure Network Security

Microsoft Azure Network Security: Securing your Cloud WorkLoads at the Network Level
English | 2021 | ISBN: 0137252048 | 208 Pages | EPUB | 25 MB

Manage Suricata Rule Sets and Rule Sources

Posted By: IrGens
Manage Suricata Rule Sets and Rule Sources

Manage Suricata Rule Sets and Rule Sources
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 6m | 190 MB
Instructor: Matt Glass

IT Governance : An International Guide to Data Security and ISO 27001/ISO 27002, Seventh Edition

Posted By: readerXXI
IT Governance : An International Guide to Data Security and ISO 27001/ISO 27002, Seventh Edition

IT Governance :
An International Guide to Data Security and ISO 27001/ISO 27002, Seventh Edition

by Alan Calder and Steve Watkins
English | 2020 | ISBN: 0749496959 | 408 Pages | PDF/ePub | 6 MB

IoT Technologies in Smart-Cities : From Sensors to Big Data, Security and Trust

Posted By: readerXXI
IoT Technologies in Smart-Cities : From Sensors to Big Data, Security and Trust

IoT Technologies in Smart-Cities : From Sensors to Big Data, Security and Trust
by Fadi Al-Turjman and Muhammad Imran
English | 2020 | ISBN: 1785618695 | 264 Pages | ePUB | 3.92 MB

Defense Evasion with ProxyChains

Posted By: IrGens
Defense Evasion with ProxyChains

Defense Evasion with ProxyChains
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 20m | 45.9 MB
Instructor: Ricardo Reimao

Cybersecurity Threats, Malware Trends, and Strategies [Repost]

Posted By: readerXXI
Cybersecurity Threats, Malware Trends, and Strategies [Repost]

Cybersecurity Threats, Malware Trends, and Strategies : Mitigate exploits, malware, phishing, and other social engineering attacks
by Tim Rains
English | 2020 | ISBN: 1800206011 | 429 Pages | PDF/ePub/Mobi | 23 MB

Digital Forensics and Incident Response, 2nd Edition [Repost]

Posted By: readerXXI
Digital Forensics and Incident Response, 2nd Edition [Repost]

Digital Forensics and Incident Response : Incident Response Techniques and Procedures to Respond to Modern Cyber Threats, 2nd Edition
by Gerard Johansen
English | 2020 | ISBN: 183864900X | 432 Pages | PDF/ePub/Mobi | 232 MB

Group Testing Theory in Network Security: An Advanced Solution (Repost)

Posted By: AvaxGenius
Group Testing Theory in Network Security: An Advanced Solution (Repost)

Group Testing Theory in Network Security: An Advanced Solution By My T. Thai
English | EPUB | 2012 | 86 Pages | ISBN : 1461401275 | 1.5 MB

Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and suggesting new solutions for various network security problems. This text also exemplifies the connection between mathematical approaches and practical applications to group testing theory in network security. This work will appeal to a multidisciplinary audience with interests in computer communication networks, optimization, and engineering.

Security and Privacy: Select Proceedings of ICSP 2020

Posted By: AvaxGenius
Security and Privacy: Select Proceedings of ICSP 2020

Security and Privacy: Select Proceedings of ICSP 2020 by Pantelimon Stănică
English | PDF | 2020 | 183 Pages | ISBN : 9813367806 | 4.4 MB

This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy.

Protecting Your Network with Open Source Software

Posted By: lucky_aut
Protecting Your Network with Open Source Software

Protecting Your Network with Open Source Software
Duration: 2h 35m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 452 MB
Genre: eLearning | Language: English

Innovative Data Communication Technologies and Application: Proceedings of ICIDCA 2020

Posted By: AvaxGenius
Innovative Data Communication Technologies and Application: Proceedings of ICIDCA 2020

Innovative Data Communication Technologies and Application: Proceedings of ICIDCA 2020 by Jennifer S. Raj
English | EPUB | 2021 | 871 Pages | ISBN : 9811596506 | 144.6 MB

This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented at the International Conference on Innovative Data Communication Technologies and Application (ICIDCA 2020), are included in the book. The book focuses on the theory, design, analysis, implementation and applications of distributed systems and networks.

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Posted By: First1
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods
English | March 23rd, 2021 | ISBN: 1718500904 | 464 pages | True EPUB | 31.60 MB

The definitive guide to hacking the world of the Internet of Things (IoT) — Internet connected devices such as medical devices, home assistants, smart home appliances and more.